-
701
A mutual exclusion key pairing scheme for preserving the privacy of channel shared 5G users
Published 2025-06-01Get full text
Article -
702
scAMZI: attention-based deep autoencoder with zero-inflated layer for clustering scRNA-seq data
Published 2025-04-01Get full text
Article -
703
-
704
Robust zero-watermarking for color images using hybrid deep learning models and encryption
Published 2025-08-01Get full text
Article -
705
Investigation of Diabetes Care in Elder Individuals Using Artificial Intelligence
Published 2022-01-01Get full text
Article -
706
IoT BotScan: Ultra-Lightweight AI Defense Against Botnet Threats
Published 2025-01-01Get full text
Article -
707
Technical, forensic and organisational aspects of work with Monero cryptocurrency
Published 2023-09-01“…The features of forensic investigation of computer equipment used to work with Monero are revealed. …”
Get full text
Article -
708
Knowledge Graph Representation Fusion Framework for Fine-Grained Object Recognition in Smart Cities
Published 2021-01-01Get full text
Article -
709
ECG Signal Classification Using Interpretable KAN: Towards Predictive Diagnosis of Arrhythmias
Published 2025-02-01Get full text
Article -
710
-
711
Detecting command injection attacks in web applications based on novel deep learning methods
Published 2024-10-01Get full text
Article -
712
An Efficient Random Forest Classifier for Detecting Malicious Docker Images in Docker Hub Repository
Published 2024-01-01Get full text
Article -
713
Detecting unknown vulnerabilities in smart contracts using opcode sequences
Published 2024-12-01Get full text
Article -
714
Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives
Published 2021-01-01“…Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. …”
Get full text
Article -
715
User authentication of industrial internet based on HHT transform of mouse behavior
Published 2022-06-01“…The rapid development of the industrial internet had caused widespread concern about the network security, and the end-user authentication technology was considered a research hotspot.According to the characteristics of human-computer interaction in industrial internet, an experimental website was designed.24 users' mouse behavior data in an uncontrolled environment were collected within 2.5 years to conduct case studies.Hilbert-Huang transform (HHT) was used to extract frequency domain features of mouse behavior signals, combined with time domain features to form a time-frequency joint domain feature matrix of 163-dimensional to characterize user mouse behavior patterns.Bagged tree, support vector machine (SVM), Boost tree and K-nearest neighbor (KNN) were used to build a user authentication model, and the comparison result showed that the Bagged tree had the best internal detection effect in this case, with an average false acceptance rate (FAR) of 0.12% and an average false rejection rate (FRR) of 0.28%.In external detection, the FAR was 1.47%.Compared with the traditional mouse dynamics method, the frequency domain information of mouse behavior extracted by HHT can better realize the user authentication, and provide technical support the security of the industrial internet.…”
Get full text
Article -
716
AD-VAE: Adversarial Disentangling Variational Autoencoder
Published 2025-03-01Get full text
Article -
717
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning
Published 2025-04-01Get full text
Article -
718
-
719
Intrusion Detection System to Advance Internet of Things Infrastructure-Based Deep Learning Algorithms
Published 2021-01-01Get full text
Article -
720